IOC Report
1728060366c73c2b51b3cccf4f90f5b82277982346f63fadf74c16a31e498f81a01832ef6b761.dat-decoded.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\1728060366c73c2b51b3cccf4f90f5b82277982346f63fadf74c16a31e498f81a01832ef6b761.dat-decoded.exe
"C:\Users\user\Desktop\1728060366c73c2b51b3cccf4f90f5b82277982346f63fadf74c16a31e498f81a01832ef6b761.dat-decoded.exe"
malicious

URLs

Name
IP
Malicious
65.52.240.233
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

IPs

IP
Domain
Country
Malicious
65.52.240.233
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2AE1000
trusted library allocation
page read and write
malicious
802000
unkown
page readonly
malicious
1B4D3000
heap
page read and write
C80000
heap
page read and write
9E0000
heap
page read and write
7FFD346BC000
trusted library allocation
page execute and read and write
7FFD3466D000
trusted library allocation
page execute and read and write
2D73000
trusted library allocation
page read and write
990000
heap
page read and write
106D000
stack
page read and write
1B70E000
stack
page read and write
7FFD34800000
trusted library allocation
page read and write
1BF9A000
stack
page read and write
7FFD34670000
trusted library allocation
page read and write
1B80E000
stack
page read and write
1B91C000
heap
page read and write
CB5000
heap
page read and write
944000
stack
page read and write
CA0000
heap
page read and write
12AE1000
trusted library allocation
page read and write
7FFD34680000
trusted library allocation
page read and write
7FFD34664000
trusted library allocation
page read and write
D65000
heap
page read and write
7FFD34780000
trusted library allocation
page execute and read and write
116D000
stack
page read and write
C93000
trusted library allocation
page read and write
F6C000
stack
page read and write
12AE8000
trusted library allocation
page read and write
1B600000
heap
page execute and read and write
800000
unkown
page readonly
7FFD34716000
trusted library allocation
page read and write
1B90E000
stack
page read and write
1AB10000
trusted library allocation
page read and write
CE3000
heap
page read and write
C90000
trusted library allocation
page read and write
1B97B000
heap
page read and write
CE0000
heap
page read and write
9B0000
heap
page read and write
1BB3F000
stack
page read and write
D29000
heap
page read and write
C70000
trusted library allocation
page read and write
1B4AA000
stack
page read and write
1B96D000
heap
page read and write
29D0000
heap
page execute and read and write
1B4D0000
heap
page read and write
7FFD3467D000
trusted library allocation
page execute and read and write
1BE9E000
stack
page read and write
7FFD34663000
trusted library allocation
page execute and read and write
1AE67000
heap
page read and write
7FF416AD0000
trusted library allocation
page execute and read and write
C00000
heap
page read and write
D61000
heap
page read and write
D14000
heap
page read and write
7FFD34811000
trusted library allocation
page read and write
2ADE000
stack
page read and write
12AEE000
trusted library allocation
page read and write
9C0000
heap
page read and write
C45000
heap
page read and write
CAD000
heap
page read and write
C50000
trusted library allocation
page read and write
1BB50000
heap
page read and write
1BE5F000
stack
page read and write
1B910000
heap
page read and write
7FFD34720000
trusted library allocation
page execute and read and write
1B94B000
heap
page read and write
D0E000
heap
page read and write
9B5000
heap
page read and write
1C09C000
stack
page read and write
2980000
heap
page read and write
7FFD34660000
trusted library allocation
page read and write
7FFD3468D000
trusted library allocation
page execute and read and write
D10000
heap
page read and write
1B958000
heap
page read and write
CD5000
heap
page read and write
7FFD34684000
trusted library allocation
page read and write
1B06D000
stack
page read and write
7FFD3471C000
trusted library allocation
page execute and read and write
7FFD34710000
trusted library allocation
page read and write
800000
unkown
page readonly
C40000
heap
page read and write
1C39C000
stack
page read and write
7FFD34746000
trusted library allocation
page execute and read and write
7FFD34672000
trusted library allocation
page read and write
1B5D4000
stack
page read and write
There are 74 hidden memdumps, click here to show them.